Remember the 5Ws? Let’s Zoom In.

In my last post, we introduced a timeless tactic — the 5W Strategy — to give structure to cyber investigations.

Now we’re digging deeper into the most exciting W of them all: Who.
Who broke in? Who wrote the malware? Who ghosted your firewall like it owed them money?

It’s time to get personal with threat actors.

Who Did It? Threat Actor Identification

Not all cyber crooks wear hoodies—but they all leave clues. Sometimes you’ll know them by name (APT29), sometimes by motive (financial), and sometimes just by their vibe (super sus traffic at 2:47AM).

Types of Threat Actors

CategoryMotivationExamples
Nation-StateEspionage, influence, disruptionAPT29 (Cozy Bear), Lazarus
Cyber-criminalsFinancial gainFIN7, LockBit, Clop
HacktivistsIdeological activismAnonymous, Killnet
InsidersRevenge, negligence, profitRogue admins, angry ex-staff
Script KiddiesClout-chasing, curiosityLow-skill opportunists

Attribution Sources

  • OSINT: Dark web chatter, GitHub scripts, forums
  • MITRE ATT&CK for known TTPs
  • Vendor Reports: CrowdStrike, Mandiant, Recorded Future to name a few

If you’re blaming North Korea or Russia for every ransomware hit, you might need to re-calibrate your radar. Attribution is science, not guesswork.

What Have They Been Doing? (Known TTPs)

TTPs — Tactics, Techniques, and Procedures — are like threat actor signatures. When you see them in the wild, it’s like recognizing a burglar by their crowbar and crow tracks.

Example TTP Table

GroupInitial AccessPrivilege EscalationCommand & ControlExfiltration Method
APT29Phishing, MFA bypassCredential dumpingDNS tunneling, HTTPSEncrypted ZIP to cloud
FIN7Malicious attachmentsPowerShell abuseCustom backdoorsSFTP, Dropbox API
ContiRDP brute forceAdmin tool hijackingCobalt StrikeRAR over HTTP

Use MITRE ATT&CK Navigator to track and visualize these techniques.

What did they do in your Org (Internal Threat Intelligence)

Now we cross-reference public intel with what actually happened inside your network.

Common Signs of Actor Activity:

  • New accounts created after hours
  • Beaconing traffic to suspicious domains
  • Files staged in temp folders before exfil
  • Lateral movement using legitimate tools (LOLbins)

Simple Real-World Parallel:

Imagine your house gets broken into. You notice muddy footprints, a missing TV, and a half-eaten cookie. From that, you figure out if it’s a hungry burglar, a teenager, or maybe Santa on the wrong day.

What Could They Do Next? (Threat Forecasting)

Threat intelligence is predictive. Based on past patterns, what might this actor do next?

Threat Forecasting Template:

If Actor Did…They Might Next…
Dumped credentialsMove to cloud apps or VPN abuse
Gained domain adminDeploy ransomware or wipe backups
Exfiltrated R&D filesSell IP or use for spear phishing campaigns

Bonus Tip: Map their likely goals to Crown Jewels in your org (e.g., customer data, financial systems, trade secrets).

How Do You Prepare? (Threat Actor Playbook)

Every known actor should trigger a playbook that includes detection, response, and business alignment. Each threat actor deserves their own “Oh no, not again” playbook.

StageResponse
Phishing emailsBlock sender domains, scan attachments in sandbox, alert users with awareness prompts
Known malwareAdd indicators to EDR/AV tools, isolate affected systems, initiate memory analysis
Beaconing C2Block outbound traffic to suspicious IPs or domains, enable proxy inspection
Data exfil signsTrigger DLP alerts, investigate traffic patterns, notify legal/compliance teams

Example: Mini Playbook for LockBit Ransomware

  • Detection: Unusual PowerShell execution combined with volume shadow copy deletions.
  • Containment: Immediate EDR quarantine of affected systems, revoke compromised credentials.
  • Eradication: Deploy scripts to remove known malware artifacts and scheduled tasks.
  • Recovery: Restore from verified backups, rotate all admin passwords.
  • Post-Incident: Conduct root cause analysis, review playbook effectiveness, brief leadership.

Looking for real playbooks? Check out TheHive Project and Sigma Rules.

The INTELscope Pyramid: From TTP to Boardroom

From the nitty-gritty (TTPs) to boardroom-level “why does this matter,” this model helps security leaders show value across layers of defense and strategy. Here’s the full strategy pyramid that connects technical threat detection to executive risk strategy.

INTELscope Pyramid

  1. TTPs & IoCs – Technical signals from logs, endpoints
  2. Threat Actor Profile – Context from external sources
  3. Internal Impact – What they did in your environment
  4. Threat Forecasting – What they’re likely to do next
  5. Preparedness Plan – Your layered defense strategy
  6. Boardroom Risk Translation – Aligning with business objectives

Next blog: We’ll unpack each layer in detail and show how to make it work in your org.

Chip’s 3-Tiered Threat Actor Strategy

Want to focus your team’s energy? Here’s how Chip breaks it down:

TierWhat It Means
PrimaryThey’ve already targeted you. Your logs, alerts, or reports confirm their presence.
SecondaryThey’ve hit your partners, vendors, or subsidiaries. You may be in their wider scope.
TertiaryThey’re active in your sector or region. Not yet knocking, but possibly scouting.

Start with primary. Stay alert on tertiary.

Special Note: For Teams Just Starting Out

New to threat actor profiling? No shame in the game. Start here:

  1. Pick one threat actor relevant to your industry, based on vendor reports or threat bulletins or your own research.
  2. Build a one-page profile with their known tools, TTPs, motivations, and history.
  3. Map their behavior to your environment using MITRE ATT&CK and your existing detection stack.
  4. Write a mini response plan that outlines steps from detection to escalation.
  5. Review every quarter to account for new tactics and infrastructure changes.

For Threat Intel Analysts & SOC Teams

Checklist for the win:

  • Monitor threat feeds and alerts from sources like AlienVault OTX and Recorded Future.
  • Correlate IOCs and behaviors to known threat actors using tools like ATT&CK Navigator.
  • Tag indicators in your SIEM, so detection rules are tied to actors.
  • Update playbooks regularly, ensuring they’re aligned with emerging campaigns.
  • Feed insights into threat modeling sessions, tabletop exercises, and board-level reporting.

This is where intelligence becomes muscle memory.

Final Thoughts

Understanding “Who did it?” isn’t about finger-pointing. It’s about knowing the enemy, anticipating their moves, and turning threat intelligence into a business asset.

Stay tuned for the next blog—we’re going full pyramid mode.

Until then, stay sharp, stay curious, and remember: not all attackers wear hoodies, but all of them hate a well-prepared SOC.


Useful Tools for Threat Actor Profiling

#ThreatIntel #CyberSecurity #SOCops #KnowYourEnemy

One response

  1. […] Third Eye intelligence“Who Did It? Unmasking Threat Actors in Cyber Intelligence (The 5W Sequel)” […]

    Like

Leave a comment